• Title/Summary/Keyword: 레거시시스템

Search Result 142, Processing Time 0.024 seconds

Design of Smart Service based on Reverse-proxy for the Internet of Things (리버스 프록시 기반 IoT 서비스 도메인 설계)

  • Park, Jiye;Kang, Namhi
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.6
    • /
    • pp.1-6
    • /
    • 2014
  • The IoT (Internet of Things) is considered as a core technology to realize interconnected world. At this, companies composing ICT industry and standard organizations make efforts to accelerate it. IETF CoRE(Constrained RESTful Environment) working group standardized CoAP (Constrained Application Protocol) for the constrained device. CoAP has RESTful architecture and CoAP option is provided to use forward-proxy. The forward-proxy is used to translate protocol and perform requests on behalf of the client. However, communication between Internet based client and LLN(Low-power and Lossy Network) based CoAP server architecture has limitations to deploy real IoT service. In this architecture, problems like response delay, URI assignment and DoS attack can be occurred. To solve these problems, we propose the reverse-proxy based system. We consider both of static IoT and mobility IoT environments. Finally, our proposed system is expected to provide efficient IoT service.

A Study in the Data Modeling for Archive System Applying RiC (RiC을 적용한 아카이브 시스템 데이터 모델링 연구)

  • Shin, Mira;Kim, Ikhan
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.19 no.1
    • /
    • pp.23-67
    • /
    • 2019
  • Records in Contexts (RiC) is an international archival description standard developed by integrating and normalizing four archival description standards of the International Council of Archives (ICA). RiC has the advantage of diversifying archival description, exposing the context of records, and ensuring data interoperability between disparate systems. In this study, RiC is set up as a key tool in the design of archive systems, and logical data modeling is performed to implement the database. Because of RiC's conceptual model, RiC-CM can be used as a data reference model, and which makes it possible to develop a data model that meets user requirements. Therefore, this study intends to implement these two data models: relational data model, which is widely used as the database on legacy systems, and graphical data model, which can flexibly extend objects around the relationship between information entities.

A Method of Implementation for Integrated Aeronautical Data Management Network Using SWIM Architecture (SWIM 구조를 이용한 항공데이터 종합관리망 구축 방안)

  • Kim, Jin-Wook;Jo, Yun-Hyun;Kim, Sang-Uk;Yoon, In-Seop;Choi, Sang-Bang;Chung, Jae Hak;Park, Hyo-Dal
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.12 no.6
    • /
    • pp.44-53
    • /
    • 2013
  • Ongoing SWIM(System Wide Information Management) with the United States and European countries as the center is a part of the ASBU(Aviation System Block Upgrade) program improved performance of aeronautical data system in the International Civil Aviation Organization and a core technology of Integrated Aeronautical Data Management Network to elevate service through digitally aeronautical information management. Therefore, in this paper, we analyze SWIM architecture and network applied the concept of SOA(Service Oriented Architecture), and propose methods of implementation transforming applications operating established legacy aeronautical data system into integrated aeronautical data management network through adapter technology. This will allow development of middleware and application suitable for the next generation infrastructure network environment for efficient ATM(Air Traffic Management)and provide timely required information for users.

TMDM for Data Integration Management in Cloud Environment (클라우드 환경에서 데이터 통합 관리를 위한 TMDM)

  • Moon, Seok-jae;Shin, Hyo-young;Jeong, Gye-dong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.970-973
    • /
    • 2012
  • In cloud environment, enterprises use a number of systems which are not interconnected and save master information in a distributed way in each of them. Master information which is not managed is incorrect and discord each other so that lowers efficiency of business process and disables optimum decision making. It is necessary to do high-qualified management of master information to operate efficient and errorless business process. This paper suggests TMDM as a solution to solve heterogeneous problems occurred between interconnected master information in cloud environment and to manage business process in an efficient method. TMDM is an information storage that is suggested to solve mutual discord problems between master information using Topic Maps that considers correlation between data. Topic Maps can be connected by association between topics in order to access through a topic to all related knowledge information which is described by the topic. This also can be applied to master information between legacy systems within cloud.

  • PDF

Design and Implementation of a Mobile Middleware System for Mobile Business (모바일 비즈니스를 위한 모바일 미들웨어 시스템 설계 및 구현)

  • Lee, Il-Joo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.2
    • /
    • pp.102-113
    • /
    • 2014
  • Present communication and network environment have been moving rapidly toward wireless and mobile base from existing wired internet base. This change of trend influences greatly on business methods accordingly. Therefore many enterprises are trying hard to adopt mobile business in order to gain competitive edge of their products and they are in need of more effective and stable mobile solutions. However, the method of establishing optimal mobile computing environment and how to handle existing business process and use vast amount of database are still needed. Therefore this paper tries to realize a mobile middleware system as a mobile business establishment supporting tool that could link various computational resource on wired internet with wireless LAN, mobile phone network, and mobile devices. To accomplish that specific goal, this paper provides a powerful tool of mobile and wireless application data access that could expand the line of business already set up in general enterprises easily and rapidly into mobile environment. When this suggested solution is applied in the field of industry, it can economically change legacy business process into mobile environment without having to change existing logic and resources at all.

A study on Production Management Efficiency Method using Supervised Learning based Image Cognition (이미지 인식 기반의 지도학습을 활용한 생산관리 효율화 방법에 관한 연구)

  • Jang, Woo Sig;Lee, Kun Woo;Lee, Sang Deok;Kim, Young Gon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.5
    • /
    • pp.47-52
    • /
    • 2021
  • Recently, demand for artificial intelligence solutions for production process management has been increasing in the manufacturing industry. However, through the application of AI solutions in the manufacturing industry, there are limitations to legacy smart factory solutions such as POP and MES.Therefore, in order to overcome this, this paper aims to improve production management efficiency by applying guidance, an artificial intelligence concept, to image recognition systems. In the system flow, As_is To be separated and actual work flow was applied, and the process was improved for overall productivity efficiency. The pre-processing plan for AI guidance learning was established and the relevant AI model was designed, developed, and simulated, resulting in a 97% recognition rate.

Context-based Web Application Design (컨텍스트 기반의 웹 애플리케이션 설계 방법론)

  • Park, Jin-Soo
    • The Journal of Society for e-Business Studies
    • /
    • v.12 no.2
    • /
    • pp.111-132
    • /
    • 2007
  • Developing and managing Web applications are more complex than ever because of their growing functionalities, advancing Web technologies, increasing demands for integration with legacy applications, and changing content and structure. All these factors call for a more inclusive and comprehensive Web application design method. In response, we propose a context-based Web application design methodology that is based on several classification schemes including a Webpage classification, which is useful for identifying the information delivery mechanism and its relevant Web technology; a link classification, which reflects the semantics of various associations between pages; and a software component classification, which is helpful for pinpointing the roles of various components in the course of design. The proposed methodology also incorporates a unique Web application model comprised of a set of information clusters called compendia, each of which consists of a theme, its contextual pages, links, and components. This view is useful for modular design as well as for management of ever-changing content and structure of a Web application. The proposed methodology brings together all the three classification schemes and the Web application model to arrive at a set of both semantically cohesive and syntactically loose-coupled design artifacts.

  • PDF

MITRE ATT&CK and Anomaly detection based abnormal attack detection technology research (MITRE ATT&CK 및 Anomaly Detection 기반 이상 공격징후 탐지기술 연구)

  • Hwang, Chan-Woong;Bae, Sung-Ho;Lee, Tae-Jin
    • Convergence Security Journal
    • /
    • v.21 no.3
    • /
    • pp.13-23
    • /
    • 2021
  • The attacker's techniques and tools are becoming intelligent and sophisticated. Existing Anti-Virus cannot prevent security accident. So the security threats on the endpoint should also be considered. Recently, EDR security solutions to protect endpoints have emerged, but they focus on visibility. There is still a lack of detection and responsiveness. In this paper, we use real-world EDR event logs to aggregate knowledge-based MITRE ATT&CK and autoencoder-based anomaly detection techniques to detect anomalies in order to screen effective analysis and analysis targets from a security manager perspective. After that, detected anomaly attack signs show the security manager an alarm along with log information and can be connected to legacy systems. The experiment detected EDR event logs for 5 days, and verified them with hybrid analysis search. Therefore, it is expected to produce results on when, which IPs and processes is suspected based on the EDR event log and create a secure endpoint environment through measures on the suspicious IP/Process.

Identification of Microservices to Develop Cloud-Native Applications (클라우드네이티브 애플리케이션 구축을 위한 마이크로서비스 식별 방법)

  • Choi, Okjoo;Kim, Yukyong
    • Journal of Software Assessment and Valuation
    • /
    • v.17 no.1
    • /
    • pp.51-58
    • /
    • 2021
  • Microservices are not only developed independently, but can also be run and deployed independently, ensuring more flexible scaling and efficient collaboration in a cloud computing environment. This impact has led to a surge in migrating to microservices-oriented application environments in recent years. In order to introduce microservices, the problem of identifying microservice units in a single application built with a single architecture must first be solved. In this paper, we propose an algorithm-based approach to identify microservices from legacy systems. A graph is generated using the meta-information of the legacy code, and a microservice candidate is extracted by applying a clustering algorithm. Modularization quality is evaluated using metrics for the extracted microservice candidates. In addition, in order to validate the proposed method, candidate services are derived using codes of open software that are widely used for benchmarking, and the level of modularity is evaluated using metrics. It can be identified as a smaller unit of microservice, and as a result, the module quality has improved.

A SOA-based Application Model for Building Intelligent Construction Supply Chain Management Framework (지능형 건설물류관리 체계 구축을 위한 SOA 적용 모델 개발)

  • Shin, Tae-Hong;Chin, Sang-Yoon;Yoon, Su-Won;Kwon, Soon-Wook;Kim, Yea-Sang
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • 2008.11a
    • /
    • pp.733-737
    • /
    • 2008
  • Construction supply chain management focused on materials in construction industry plays a critical role which controls the success and failure of a project. For the efficiency of construction supply chain management, the framework which provides project participants with the information originated from whole construction logistics steps without the omission and discontinuation of information flow is required. The new management framework that can support this environment is necessary because of setting up the complicated and distributed environment including logistics information management by intelligent equipment, co-working management with pre-framework legacy system and various devices(UMPC and PDA etc.) as the information confirmation and electrical transmission tool between the project participants different from former construction supply chain management environment while recently developing ubiquitous technologies such as RFID/USN and intelligent equipment to support logistics process. Therefore, the objective of this study is to introduce the concept of SOA (Service Oriented Architecture) as an alternative of effective information integration under the complex and distributed environment and to propose the SOA-based application model for building intelligent construction supply chain management framework.

  • PDF